Top 3 Infamous Security Breaches of 2021

As the end of 2021 and the start of a new year comes into sight, now is the perfect time to reflect upon how businesses have fared with their cyber security and how they have handled a security breach. It has been much reported, that this year has brought new challenges to businesses in the […]
InfoSec Colour Team Structure – The White Team

The White Team are a high-level team with non-technical reasonabilities. Generally, small in size, they are made from a mixture of senior technical members, management and business sponsors. This White team primary reasonabilities are creating and communicating cybersecurity strategies, KPI and SLA’s, governance risk assessments, organising teams and planning cyber exercises. It is vital that […]
InfoSec Colour Team Structure – The Green Team

The Green Team are created to maximise the effectiveness of the Blue and Yellow teams. They do this by integrating Yellow team members (with enhanced and in-depth knowledge of architecture and coding) with members of the Blue team that have the required defensive and operational skills. Ideally The Green Team shouldn’t be a permanent team, but […]
InfoSec Colour Team Structure – The Orange Team

In this fourth instalment in the InfoSec Colour team series, we will be exploring the role of the Orange Team, its role in the InfoSec Colour Team Structure and how it interacts with the other teams. The Orange team are created to maximise the effectiveness of both the Red and Yellow teams. They do this […]
InfoSec Colour Team Structure – The Yellow Team

Introducing The Yellow Team, known as the builders of systems and solutions, is the collection of individuals who are responsible for the design and build of information systems and solutions, created to meet an organisation’s requirements. Typically, The Yellow Team are made up of; application developers software engineers architects testing teams If we look at […]
InfoSec Colour Team Structure – The Purple Team

Purple teams are created to maximise the effectiveness of the Red and Blue teams. They do this by integrating Blue team members with enhanced and in-depth knowledge of defensive tactics and controls, with members of the Red team, whose skills lie in hacking and exploitation. Purple shouldn’t be a permanent team, but rather a dynamic […]